Mocana Now Working With TPM 2.0 Platform

Mocana Now Working With TPM 2.0 Platform

Mocana Now Working With TPM 2.0 Platform

Mocana, a security solutions provider for the Internet of Things (IoT), announced on Wednesday support for Trusted Platform Module (TPM) 2.0.

Written By
David Curry
David Curry
Jul 25, 2018
1 minute read

Mocana, a security solutions provider for the Internet of Things (IoT), announced on Wednesday support for Trusted Platform Module (TPM) 2.0. Integration of the module allows device manufacturers to build products that meet the highest cybersecurity standards.

Customers use Mocana to easily secure storage, communications, and firmware updates for IoT devices.

See also: Research Suggests Microsoft Azure Cheapest at Scale for IoT

Cybersecurity is becoming a more prominent issue for IoT developers after a series of mishaps exposed the vulnerabilities of thousands of connected devices feeding back to a network.

TPM 2.0 is used by most PC and notebook manufacturers. For Windows 8.1 and 10, all computers need a TPM 2.0 module to pass Microsoft’s hardware certification. Google includes TPM 2.0 in all Chromebooks.

“As the pace of cyber attacks on IoT and industrial systems increases, there is a critical need for stronger security on IoT devices,” said Srinivas Kumar, vice president of engineering at Mocana.

“TPM technology has been used broadly to prove the identity of a computer or financial transaction device. We are now enabling the latest TPM 2.0 feature set on IoT devices. This will significantly reduce the effort for our customers to leverage TPM technology and avoid reading the more than 3,000 pages of TPM technical documentation.”

Benefits of TPM 2.0 include support for advanced ciphers, such as Elliptic Curve Cryptography, 256 and 512-bit Secure Hash Algorithms 2; multiple ownership of keys; support for Windows and Linux systems; and better seeding for entropy.

David Curry

David is a technology writer with several years experience covering all aspects of IoT, from technology to networks to security.

Featured Resources from Cloud Data Insights

Real-time Analytics News for the Week Ending May 16
How AI Is Repeating Familiar Shadow IT Security Risks
Vector Databases and Semantic Search: The Next Frontier in Unstructured Data Analytics
Manufacturing Keeps Making the Same Security Mistakes
Apu Pavithran
May 14, 2026
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.